CVE-2025-15138

4.7 MEDIUM

📋 TL;DR

This vulnerability in TinyFileManager allows attackers to perform path traversal attacks by manipulating the 'fullpath' parameter in tinyfilemanager.php. This could enable unauthorized file access or uploads. All users running TinyFileManager up to version 2.6 are affected.

💻 Affected Systems

Products:
  • prasathmani TinyFileManager
Versions: Up to and including 2.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the core file manager functionality and affects all installations of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution through file upload combined with path traversal, potentially leading to complete system compromise.

🟠

Likely Case

Unauthorized file access, directory traversal, and potential file upload to arbitrary locations.

🟢

If Mitigated

Limited to file enumeration and read access if proper file permissions restrict write operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been published online and the vulnerability is remotely exploitable without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version above 2.6 if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation for fullpath Parameter

all

Add input validation to sanitize the fullpath parameter and prevent directory traversal sequences.

Edit tinyfilemanager.php and add path sanitization before processing fullpath parameter

Web Application Firewall Rules

all

Implement WAF rules to block directory traversal patterns in requests.

Add WAF rule to block requests containing '../', '..\', or similar traversal patterns

🧯 If You Can't Patch

  • Remove or disable TinyFileManager from internet-facing systems
  • Implement strict network access controls to limit access to TinyFileManager instances

🔍 How to Verify

Check if Vulnerable:

Check if TinyFileManager version is 2.6 or earlier by examining the software version in the interface or source files.

Check Version:

Check the version in tinyfilemanager.php header or configuration files

Verify Fix Applied:

Test path traversal attempts with payloads like '../../etc/passwd' in the fullpath parameter to verify they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns in parameters
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP requests with path traversal payloads in URL parameters

SIEM Query:

web.url:*../* OR web.param:*../*

🔗 References

📤 Share & Export